Creighton Barrett Dalhousie University Archives

Slides:



Advertisements
Similar presentations
Watching the Detectives Forensic Information in Digital Objects (FIDO)
Advertisements

GETTING BITS OFF DISKS Using Open Source Tools to Prepare Born-Digital Materials for Long-Term Preservation and Access To connect to the audio portion.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Computer Forensics.
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Transformations at GPO: An Update on the Government Printing Office's Future Digital System George Barnum Coalition for Networked Information December.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
I have lost all my vacation pictures due to memory card corruption. Can I get them back? I have accidently deleted some important Photos, Music files.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
By Drudeisha Madhub Data Protection Commissioner Date:
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Anthony Atkins Digital Library and Archives VirginiaTech ETD Technology for Implementers Presented March 22, 2001 at the 4th International.
Untitled (Hidden Track): Born Digital Content Preservation Service at UIUC Tracy Popp, MS LIS, CAS Digital Preservation Coordinator University Library.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
ACQUISITION OF ADVANCED FORENSICS FORMAT BASED FORENSIC SOFTWARE Informal Proposal Chris Nelson.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
Digital Crime Scene Investigative Process
Copyright 2013 © President & Fellows of Harvard College Digital Forensics at Harvard Business School NE NDSA Lightning Talk, 10 May 2013 Rachel Wise, Baker.
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Infosec Pro Guide Ch 6 Testing Your Tools.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Implementing UP 17 February Project Phases Analysis Implementation Evaluation Development Design.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
The Challenge of E-Records: Adopting Digital Forensics as a Solution William Vinh-Doyle November 5, 2015.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Unit 19 Computer Music Systems 1 Examine the hardware options available for the composition and production of music using computer technology assess the.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Digital forensics tools and methodologies in archival repositories
Tools for identifying duplicate files and known software files
Joseph JaJa, Mike Smorul, and Sangchul Song
Guide to Computer Forensics and Investigations Fifth Edition
Section 15.1 Section 15.2 Identify Webmastering tasks
Chapter 5 EnCase Concepts.
Knut Kröger & Reiner Creutzburg
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Forensic Concept of Data
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics Chris Rozic.
Operating Systems Tasks 17/02/2019.
Digital Forensics CJ
bitcurator-access-webtools Quick Start Guide
Forensic Recovery of Evidence Device (FRED)
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
IBM Tivoli Storage Manager
Radical Collaboration between Computer Science and Archival Science to Educate Next Generation Archivists Jane Zhang Catholic University of America 2019.
Presentation transcript:

Accessing the inaccessible: digital forensics at the Dalhousie University Archives Creighton Barrett Dalhousie University Archives Council of Nova Scotia Archives Conference May 11, 2017

Overview Introduction to digital forensics in archival repositories Development of Dalhousie’s digital forensics lab Forensic images Digital forensics tools and workflows Free digital forensics tools Ask questions any time! Digital forensics at the Dalhousie University Archives

What is digital forensics? Forensic science – recovery and investigation of data found in digital storage devices Primarily used in criminal investigations, corporate investigations Archives are adopting digital forensics techniques to support acquisition, accessioning, preservation, and access Acquisition Identification Evaluation Admission Source: Infosec Institute, Digital Forensic Models (January 25, 2016): http://resources.infosecinstitute.com/digital-forensics-models/ Digital forensics at the Dalhousie University Archives

Why have a digital forensics lab? Source: Baker, M. (2017, May 2). Disks back from the dead. Nature, 545 (7652), 117–118. https://doi.org/10.1038/545117a Digital forensics at the Dalhousie University Archives

Why have a digital forensics lab? Archivists are now working with a wide variety of: Digital storage devices Computer file systems, operating systems, and software File formats Digital storage devices are unstable and data is at risk Supports archival mission to preserve authenticity and integrity of records Digital forensics at the Dalhousie University Archives

How are archives doing digital forensics work? Use write-blockers to create forensic images Adopt forensic software (BitCurator or FTK or EnCase) Incorporate digital forensics tools and techniques into core archival functions New policy decisions (e.g., preserve forensic image or extract files?) Archival functions become blurred (e.g., files can be arranged before they are accessioned) Digital forensics at the Dalhousie University Archives

Timeline at Dalhousie February 2016 – Acquire forensic workstation May – November 2016 – Digital archives collection assessment project: http://hdl.handle.net/10222/72663 January 2017 – Install BitCurator and Forensic Toolkit (FTK) software February 2017 – Advanced computer forensics training May 2017 – Launch digital forensics lab April 2017 – Dal’s first time at BitCurator Users Forum Digital forensics at the Dalhousie University Archives

Digital forensics at the Dalhousie University Archives

Components of Digital Forensics Lab Forensic tower Dual Intel Xeon processors 64 GB RAM Tableau T35689iu write-blocker AFT EX-S3 forensic card reader FTK software BitCurator software Digital forensics at the Dalhousie University Archives

Forensic images

What is a forensic image? Complete (i.e., bit-level) copy of a hard drive or other digital storage media Includes unallocated space and slack space Includes operating system and file system Includes computer registry files, browser history, and other contextual information about how the computer was used Includes all files on the hard drive Digital forensics at the Dalhousie University Archives

Preserve information about the operating system and file system Source: Power Data Recovery: The Volume does not contain a recognized file system – how to fix : https://www.powerdatarecovery.com/hard-drive-recovery/volume-not-contain-recognized-file-system.html Digital forensics at the Dalhousie University Archives

Preserve data in slack space / unallocated space Overwrite zero with one = more like 0.95 Overwrite one with one = more like 1.05 Normal equipment will read both values as a one Digital forensics equipment makes it possible to determine what data exists in “slack space” and “unallocated space.” Digital forensics at the Dalhousie University Archives

Some differences between forensic and logical images Forensic image Logical image Recovers operating system and file system Does not recover operating system and file system Potential for password recovery, decryption, etc. Almost no potential for password recovery, decryption, etc. Recover Internet search queries and form data Cannot recover Internet search queries and form data Size of entire hard drive, regardless of how many files are stored Size of files on hard drive Digital forensics at the Dalhousie University Archives

Digital forensics tools

Digital forensics at the Dalhousie University Archives

Digital forensics at the Dalhousie University Archives

Digital forensics at the Dalhousie University Archives

Digital forensics at the Dalhousie University Archives

Digital forensics workflows

Abstract digital forensics model Identification Preparation Approach Strategy Preservation Collection Examination Analysis Presentation Returning Evidence Source: Infosec Institute, Digital Forensic Models (January 25, 2016): http://resources.infosecinstitute.com/digital-forensics-models/ Digital forensics at the Dalhousie University Archives

Penn State University workflow Digital forensics at the Dalhousie University Archives

Dalhousie University workflow (draft) Very premature Does not factor staffing, roles and responsibilities, etc. Relates to other workflows in development (e.g., acquisitions, accessioning) Digital forensics at the Dalhousie University Archives

Forensic imaging workflow (BitCurator) Digital forensics at the Dalhousie University Archives

Identify privacy concerns Digital forensics at the Dalhousie University Archives

Bill Freedman fonds filtered in FTK Description # of files Size Unfiltered All files in case 26,651,084 3,568 GB Primary status Duplicate File indicator IS “Primary” 731,417 83.48 GB Secondary status Duplicate File indicator IS “Secondary” 16,569,218 271.5 GB KFF Ignore Match all files where KFF status IS “Ignore” 2,548,119 44.29 GB No KFF Ignore Match all files where KFF status IS NOT “Ignore” + KFF status IS “Not checked” 24,102,965 3524 GB Primary status + No KFF Ignore Match all files where duplicate file indicator IS “Primary” + KFF status IS NOT “Ignore” 626,351 71.95 GB Actual files + Primary status + No KFF Ignore Match all disk-bound files where duplicate file indicator IS “Primary” + KFF status IS NOT “Ignore” 103,412 61.81 GB Digital forensics at the Dalhousie University Archives

Free digital forensics tools and resources – FTK Imager, BitCurator, and SleuthKit

FTK Imager (free download) Create forensic images of source media Intended for use with hardware write blocker Preview, triage, and image Export, hash, convert Preview data Triage Create forensic images Export Hash Convert Digital forensics at the Dalhousie University Archives

FTK Imager (free download) Imaging tool – create forensic images of mounted Preview tool – preview evidence to determine if further analysis is needed Export tool – quickly select and export files prior to performing full analysis of the disk image FTK Imager can open mounted drive, contents of a folder, or a forensic image FTK Imager cannot create image of a networked drive Digital forensics at the Dalhousie University Archives

FTK Imager – Create Image Digital forensics at the Dalhousie University Archives

SleuthKit + Autopsy Images source: https://www.sleuthkit.org/ Digital forensics at the Dalhousie University Archives

SleuthKit + Autopsy SleuthKit is a collection of command line tools to investigate disk images Tools support the analysis of volume and file system data Autopsy is graphical user interface to SleuthKit and other digital forensics tools Digital forensics at the Dalhousie University Archives

Free resources Forensics wiki: http://forensicswiki.org/wiki/Main_Page List of digital forensics tools: https://en.wikipedia.org/wiki/List_of_digital_forensics_t ools BitCurator wiki: https://wiki.bitcurator.net/index.php?title=Main_Page Digital forensics at the Dalhousie University Archives